Preferred Language
Articles
/
9xfNZZABVTCNdQwCLoiP
Simultaneous Spectrophotometric Determination of Piroxicam, Naproxen, Diclofenac Sodium and Mefenamic Acid in Pharmaceutical Formulations by Partial Least Squares Method
...Show More Authors

A chemometric method, partial least squares regression (PLS) was applied for the simultaneous determination of piroxicam (PIR), naproxen (NAP), diclofenac sodium (DIC), and mefenamic acid (MEF) in synthetic mixtures and commercial formulations. The proposed method is based on the use of spectrophotometric data coupled with PLS multivariate calibration. The Spectra of drugs were recorded at concentrations in the linear range of 1.0 - 10 μg mL-1 for NAP and from 1.0 - 20 μg mL-1 for PIR, DIC, and MEF. 34 sets of mixtures were used for calibration and 10 sets of mixtures were used for validation in the wavelength range of 200 to 400 nm with the wavelength interval λ = 1 nm in methanol. This method has been used successfully to quantify drugs in pharmaceutical formulations with no interference from excipients. The proposed method is simple, quick, and can be used as an alternative analysis tool in drug and formulation quality control as well as process control.

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Mar 31 2017
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Preparations of Organoclay Using Cationic Surfactant and Characterization of PVC/ (Bentonite and Organoclay) Composite Prepared via Melt Blending Method
...Show More Authors

Calcium-Montmorillonite (bentonite) [Ca-MMT] has been prepared via cation exchange reaction using benzalkonium chloride [quaternary ammonium] as a surfactant to produce organoclay which is used to prepare polymer composites. Functionalization of this filler surface is very important factor for achieving good interaction between filler and polymer matrix. Basal spacing and functional groups identification of this organoclay were characterized using X-Ray Diffraction (XRD) and Fourier Transform Infrared (FTIR) spectroscopy respectively.  The (XRD) results showed that the basal spacing of the treated clay (organoclay) with the benzalkonium chloride increased to 15.17213 0A, this represents an increment of about 77.9% in the

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Lactic Acid Bacteria (LAB) with Probiotic Potential from Dengke Naniura
...Show More Authors

Dengke Naniura is a traditional food from Sumatera Utara, Indonesia, that is produced through fermenting process, and this food is believed to contain high probiotics. The objective of the current research is to determine the potential of LAB as a probiotic that has been obtained from Dengke Naniura. Dengke Naniura was traditionally prepared from Cyprinus carpio. Four LABs have been successfully isolated from Dengke Naniura, such as D7DA3, D7B3, D7DBF and D7DN3. Those four LAB isolates were identified as Lactobacillus sp. This result has been confirmed by the non-spore forming bacterium, non-motile, and Gram-positive. Also, it has been supported by biochemical test, for the example Voges Proskauer, catalase test, Methyl

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Oct 17 2018
Journal Name
Journal Of Economics And Administrative Sciences
The Use Of the Bayesian Method and Restricted Maximum Likelihood in estimating of mixed Linear Components with random effects model with practical application.
...Show More Authors

In this research we study a variance component model, Which is the one of the most important models widely used in the analysis of the data, this model is one type of a multilevel models, and it is considered as linear models , there are three types of linear variance component models ,Fixed effect of linear variance component model, Random effect of linear variance component model and Mixed effect of linear variance component model . In this paper we will examine the model of mixed effect of linear variance component model with one –way random effect ,and the mixed model is a mixture of fixed effect and random effect in the same model, where it contains the parameter (μ) and treatment effect (τi ) which  has

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 09 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
New Schiff Base Derived From Folic Acid and 3Aminoacetophenone and its Metal Complexes with Some Transition Metals and Evaluation of Their Biological Activity
...Show More Authors

The ligand [Potassium (E)-(4-(((2-((1-(3-aminophenyl) ethylidene) amino)-4-oxo-1, 4-dihydropteridin-6-yl) methyl) amino) benzoyl)-L-glutamate] was prepared from the condensation reaction of folic acid with (3-aminoacetophenone) through Schiff reaction to give a new Schiff base ligand [H2L]. The ligand [H2L] was characterized by elemental analysis CHN, atomic absorption (AA),(FT-IR),(UV-Vis), TLC, ES mass (for spectroscopes), molar conductance, and melting point. The new Schiff base ligand [H2L], reacts with Mn (II), Co (II), Ni (II), Cu (II), Cr (III) and Cd (II) metal ions and (2-aminophenol),(metal: derivative ligand: 2-aminophenol) to give a series of new mixed complexes in the general formula:-K3 [M2 (HL)(HA) 2],(where M= Mn (II) and Cd

... Show More
Publication Date
Wed May 01 2019
Journal Name
Journal Of Engineering
Reduced Complexity SLM Method for PAPR Reduction
...Show More Authors

In this paper, the computational complexity will be reduced using a revised version of the selected mapping (SLM) algorithm. Where a partial SLM is achieved to reduce the mathematical operations around 50%. Although the peak to average power ratio (PAPR) reduction gain has been slightly degraded, the dramatic reduction in the computational complexity is an outshining achievement. Matlab simulation is used to evaluate the results, where the PAPR result shows the capability of the proposed method.  

 

View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
FINITE ELEMENT METHOD FOR INCOMPRESSIBLE VISCOELASTIC MATERIALS
...Show More Authors

A numerical method (F.E.)was derived for incompressible viscoelastic materials, the aging and
environmental phenomena especially the temperature effect was considered in this method. A
treatment of incompressibility was made for all permissible values of poisons ratio. A
mechanical model represents the incompressible viscoelastic materials and so the properties can
be derived using the Laplace transformations technique .A comparison was made with the other
methods interested with viscoelastic materials by applying the method on a cylinder of viscoelastic material surrounding by a steel casing and subjected to a constant internal pressure, as well as a comparison with another viscoelastic method and for Asphalt Concrete pro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 07 2014
Journal Name
Baghdad Science Journal
New Iterative Method for Solving Nonlinear Equations
...Show More Authors

The aim of this paper is to propose an efficient three steps iterative method for finding the zeros of the nonlinear equation f(x)=0 . Starting with a suitably chosen , the method generates a sequence of iterates converging to the root. The convergence analysis is proved to establish its five order of convergence. Several examples are given to illustrate the efficiency of the proposed new method and its comparison with other methods.

View Publication Preview PDF
Crossref